Skip to content

2026-02-02 — OpenList ships with insecure TLS defaults (GHSA-wf93-3ghh-h389)

Summary

A GitHub Security Advisory reports that OpenList disables TLS certificate verification by default for outgoing storage driver communications.

This enables Man-in-the-Middle (MitM) attacks that can lead to decryption, theft, and manipulation of data in transit.

  • Advisory: https://github.com/advisories/GHSA-wf93-3ghh-h389
  • Root cause (example): defaulting TlsInsecureSkipVerify to true (certificate verification skipped)

What to do (durable guidance)

This is a recurring class of failure: shipping insecure-by-default TLS settings.

If you operate affected software

  1. Inventory and confirm settings
  2. Find any configuration flags like:
    • InsecureSkipVerify
    • tlsSkipVerify
    • verifyTls=false
  3. Assume that “it works in dev” often means “verification is disabled”.

  4. Turn verification on (and test correctly)

  5. Enable certificate verification for all outbound TLS connections.
  6. Fix the root cause of failures (correct CA bundle / intermediate chain / SNI / hostname).

  7. Make exceptions explicit and scoped

  8. If you must allow unverified TLS temporarily:

    • make it opt-in, not default
    • scope it to a specific endpoint
    • add hard expiration (time-bomb) and loud logging/metrics
  9. Treat internal networks as hostile

  10. MitM is feasible via rogue Wi‑Fi, ARP spoofing, compromised routers/switches, or malicious proxies.
  11. “Only internal traffic” is not a control.

If you build software (how to avoid this class)

  • Secure defaults: certificate verification ON by default.
  • Configuration validation: fail fast if verification is disabled without an explicit acknowledgement.
  • No silent downgrade: if TLS verification is off, emit a startup warning and surface a health check signal.
  • Prefer trust configuration over bypasses: allow supplying a CA bundle / pinset rather than skipVerify.